scholarly journals 4-dimensional Model for Describing Status of Peers in Peer-to-Peer Distributed Systems

Author(s):  
SEYEDEH LEILI MIRTAHERI
2011 ◽  
Vol 23 (13) ◽  
pp. 1506-1521 ◽  
Author(s):  
Niels Drost ◽  
Rob V. van Nieuwpoort ◽  
Jason Maassen ◽  
Frank J. Seinstra ◽  
Henri E. Bal

2011 ◽  
Vol 22 (05) ◽  
pp. 1123-1142 ◽  
Author(s):  
EMMANUELLE ANCEAUME ◽  
FRANCISCO BRASILEIRO ◽  
ROMARIC LUDINARD ◽  
BRUNO SERICOLA ◽  
FRÉDÉRIC TRONEL

Awerbuch and Scheideler have shown that peer-to-peer overlay networks can survive Byzantine attacks only if malicious nodes are not able to predict what will be the topology of the network for a given sequence of join and leave operations. In this paper we investigate adversarial strategies by following specific protocols. Our analysis demonstrates first that an adversary can very quickly subvert overlays based on distributed hash tables by simply never triggering leave operations. We then show that when all nodes (honest and malicious ones) are imposed on a limited lifetime, the system eventually reaches a stationary regime where the ratio of polluted clusters is bounded, independently from the initial amount of corruption in the system.


2006 ◽  
pp. 226-258 ◽  
Author(s):  
Silvana Castano ◽  
Alfio Ferrara ◽  
Stefano Montanelli

In open distributed systems like peer-to-peer networks and Grids, many independent peers, possibly spanned across multiple organizations, need to share information resources (e.g., data, documents, services) provided by other nodes. By dynamic knowledge discovery we mean the capability of each node of finding knowledge in the system about information resources that, at a given moment, best match the requirements of a request for given target resource(s). The chapter will focus on describing models and techniques for ontology metadata management and ontology-based dynamic knowledge discovery in open distributed systems, by describing the architecture of a toolkit for information resource discovery and sharing developed in the Helios peer-based system.


Author(s):  
B. Mejías ◽  
P. Van Roy

Distributed systems with a centralized architecture present the well known problems of single point of failure and single point of congestion; therefore, they do not scale. Decentralized systems, especially as peer-to-peer networks, are gaining popularity because they scale well, and do not need a server to work. However, their complexity is higher due to the lack of a single point of control and synchronization, and because consistent decentralized storage is difficult to maintain when data constantly evolves. Self-management is a way of handling this higher complexity. In this paper, the authors present a decentralized system built with a structured overlay network that is self-organized and self-healing, providing a transactional replicated storage for small or large scale systems.


Author(s):  
Mayank Singh ◽  
Shashikala Tapaswi

Mutual exclusion is one of the well-studied fundamental primitives in distributed systems, and a number of vital solutions have been proposed to achieve the same. However, the emerging Peer to Peer systems bring forward several challenges to protect consistent and concurrent access to shared resources, as classical peer-to-peer systems, like Napster, Gnutella, et cetera, have been mainly used for sharing files with read only permission. In this chapter, the authors propose a quorum based mutual exclusion algorithm that can be used over any Peer to Peer Distributed Hash Table (DHT). The proposed approach can be seen as extension to traditional Sigma protocol for mutual exclusion in Peer to Peer systems. The basic idea is to reduce message overhead with use of smart nodes present in each quorum set and message passing between the current owners of resource with next resource requester nodes.


Author(s):  
O. Babaoglu ◽  
A. Kermarrec ◽  
R. van Renesse ◽  
L. Rodrigues ◽  
M. van Steen ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document